| Publication | Date of Publication | Type |
|---|
| https://portal.mardi4nfdi.de/entity/Q6126362 | 2024-04-09 | Paper |
| Explicit uniquely decodable codes for space bounded channels that achieve list-decoding capacity | 2023-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6084353 | 2023-10-31 | Paper |
| Is it possible to improve Yao's XOR lemma using reductions that exploit the efficiency of their oracle? | 2023-07-10 | Paper |
| Explicit list-decodable codes with optimal rate for computationally bounded channels | 2021-06-04 | Paper |
| Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols | 2020-12-04 | Paper |
| Channels of small log-ratio leakage and characterization of two-party differentially private computation | 2020-04-30 | Paper |
| Pseudorandom Generators with Optimal Seed Length for Non-Boolean Poly-Size Circuits | 2019-12-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4636479 | 2018-04-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4601848 | 2018-01-24 | Paper |
| Pseudorandomness when the odds are against you | 2017-10-10 | Paper |
| On beating the hybrid argument | 2016-10-07 | Paper |
| Incompressible functions, relative-error extractors, and the power of nondeterministic reductions | 2016-06-30 | Paper |
| Parallel Hashing via List Recoverability | 2015-12-10 | Paper |
| Pseudorandom generators with optimal seed length for non-boolean poly-size circuits | 2015-06-26 | Paper |
| Mining circuit lower bound proofs for meta-algorithms | 2015-06-23 | Paper |
| 2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction | 2014-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3191596 | 2014-10-06 | Paper |
| Extractors and pseudo-random generators with optimal seed length | 2014-09-26 | Paper |
| Lower bounds on the query complexity of non-uniform and adaptive reductions showing hardness amplification | 2014-09-25 | Paper |
| Dispersers for Affine Sources with Sub-polynomial Entropy | 2014-07-30 | Paper |
| Derandomized parallel repetition theorems for free games | 2013-09-30 | Paper |
| 2-source dispersers for \(n^{o(1)}\) entropy, and Ramsey graphs beating the Frankl-Wilson construction | 2013-01-03 | Paper |
| Invertible Zero-Error Dispersers and Defective Memory with Stuck-At Errors | 2012-11-02 | Paper |
| Weak derandomization of weak algorithms: explicit versions of Yao's lemma | 2012-09-21 | Paper |
| Pseudorandom generators, typically-correct derandomization, and circuit lower bounds | 2012-06-26 | Paper |
| Increasing the output length of zero-error dispersers | 2012-03-07 | Paper |
| Lower Bounds on the Query Complexity of Non-uniform and Adaptive Reductions Showing Hardness Amplification | 2011-08-17 | Paper |
| An Introduction to Randomness Extractors | 2011-07-07 | Paper |
| Hardness Amplification Proofs Require Majority | 2011-04-04 | Paper |
| Simulating independence | 2010-08-16 | Paper |
| Simulating independence | 2010-07-14 | Paper |
| Low-End Uniform Hardness versus Randomness Tradeoffs for AM | 2010-07-07 | Paper |
| Approximation, Randomization, and Combinatorial Optimization.. Algorithms and Techniques | 2010-05-26 | Paper |
| True Random Number Generators Secure in a Changing Environment | 2010-03-09 | Paper |
| Strong Parallel Repetition Theorem for Free Projection Games | 2009-10-28 | Paper |
| Pseudorandom Generators and Typically-Correct Derandomization | 2009-10-28 | Paper |
| Reducing complexity assumptions for statistically-hiding commitment | 2009-06-30 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Non-interactive timestamping in the bounded-storage model | 2009-05-08 | Paper |
| On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols | 2009-03-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3549642 | 2009-01-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5302083 | 2009-01-05 | Paper |
| Simple extractors for all min-entropies and a new pseudorandom generator | 2008-12-21 | Paper |
| Increasing the Output Length of Zero-Error Dispersers | 2008-11-27 | Paper |
| How to get more mileage from randomness extractors | 2008-09-04 | Paper |
| Reducing Complexity Assumptions for Statistically-Hiding Commitment | 2008-05-06 | Paper |
| If NP languages are hard on the worst-case, then it is easy to find their hard instances | 2008-03-11 | Paper |
| Pseudorandomness for approximate counting and sampling | 2007-11-14 | Paper |
| Deterministic Extractors for Bit‐Fixing Sources by Obtaining an Independent Seed | 2007-09-07 | Paper |
| Reducing the seed length in the Nisan-Wigderson generator | 2007-05-08 | Paper |
| Constant-round oblivious transfer in the bounded storage model | 2007-05-03 | Paper |
| Extracting Randomness via Repeated Condensing | 2006-06-01 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4668731 | 2005-04-15 | Paper |
| Uniform hardness versus randomness tradeoffs for Arthur-Merlin games | 2005-02-11 | Paper |
| Towards proving strong direct product theorems | 2004-12-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3152800 | 2002-01-01 | Paper |